• 제목/요약/키워드: Analysis application

검색결과 20,761건 처리시간 0.04초

간호사의 정보기술(IT)활용이 지식관리활동에 미치는 영향 (The Effect of Information Technology Application on Knowledge Management Process in Clinical Nurses)

  • 정석희
    • 간호행정학회지
    • /
    • 제10권1호
    • /
    • pp.141-159
    • /
    • 2004
  • Purpose: The purpose of this study was to investigate the degree of information technology application, and to identify the effect of information technology application en knowledge management process in clinical nurses. Method: Participants were 629 regular clinical nurses who had worked for over 1 year in general units of 9 tertiary medical hospitals including 2 national university hospitals, 5 university hospitals, and 2 hospitals founded by business enterprises. Data were collected from March to May 2003 through questionnaires. Thee structured instruments were used to collect the data: Information Technology Application scale, Knowledge Management Process Scale(Jeong, Lee, Lee, & Kim, 2003), and one for general characteristics. The data were analyzed using reliability analysis, descriptive analysis, one-way ANOVA, $Scheff{\acute{e}$ test, correlation analysis, partial correlation analysis, and multiple regression analysis with the SPSS for Windows 10,0 program. Result: 1) The HIS application degree, IT application ability, and IT application frequency were significantly correlated with the degree of knowledge management process activation and 4 elements of knowledge management process, Knowledge Creation, Knowledge Storage, Knowledge Sharing, and Knowledge Utilization(p=.000). 2) The 3 variables, HIS application degree, IT application ability, and IT application frequency explained 47.2% of the total variance of the degree of knowledge management process activation, and 352% of me total variance of Knowledge Storage. And 2 variables, HIS application degree and IT application frequency explained 17.6% of the total variance of Knowledge Creation, 39.9% of the total variance of Knowledge sharing, and 33.8% of the total variance of Knowledge utilization(p=.000). 3) As a result of multiple regression analysis, the key determinant of the degree of knowledge management process activation for nurses was HIS application degree The HIS application degree, IT application frequency, position, IT application ability, and continuous total numbers of years working at the present hospital explained 51.1% of the total variance of the degree of knowledge management process activation(p=.000). Conclusions: These results suggest that the information technology application positively affects the nurses' knowledge management process. From the above findings, information technology application is empirically verified as a useful and effective method to activate knowledge management process, and knowledge management.

  • PDF

RI-Biomics 기술정보시스템을 활용한 효율적인 정보 수집-분석-활용 체계 수립에 관한 연구 (Development of Efficient System for Collection-Analysis-Application of Information Using System for Technology and Information in the Field of RI-Biomics)

  • 장솔아;김주연;박태진
    • 방사선산업학회지
    • /
    • 제9권3호
    • /
    • pp.161-166
    • /
    • 2015
  • RI-Biomics is the new radiation fusion technology of which, such as the characteristics of radioisotope, is applied to the biomics. In order to sharing and overall analysis of data between the institutions through total management of information in the field of RI-Biomics, RI-Biomics Information portal 'RIBio-Info' was constructed by KARA (Korean Association for Radiation Application) in February 2015. For systematic operation of this 'RIBio-Info' system, it is required to develop system of collection-analysis-application of information. So, in this paper, we summarized development of document forms at each processes of collection-analysis-application of information and systematization of collection methods of information, establishment of characteristically analysis methods of reports such as issue paper, policy report, global market report and watch report. Therefore, these are expected to improving the practical applicability in this field through the vitalization of technology development of users by achieving the circular structure of collectionanalysis-application of information.

변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구 (A Research on Mobile Malware Model propagated Update Attacks)

  • 주승환;서희석
    • 디지털산업정보학회논문지
    • /
    • 제11권2호
    • /
    • pp.47-54
    • /
    • 2015
  • The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권4호
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

IT 아웃소싱 어플리케이션 운영 계약모델에 대한 실증적 연구 (An Empirical Study on Contract Model for IT Outsourcing Application Operation)

  • 김흥식;박소아
    • 한국IT서비스학회지
    • /
    • 제16권2호
    • /
    • pp.45-60
    • /
    • 2017
  • The study suggests a contract model of application operation through case study of A bank's IT outsourcing application contract based on workload. The IT outsourcing order form has a problem in that the scope of work is ambiguous due to the integration of operation and maintenance. In this study, application operation and maintenance were separated by referring to application operation history provided in ISO/IEC15504-5 standard. The scope of the IT outsourcing service was clarified by organizing the definition and detail activities of the application operation business. Application operation contract method has generally applied estimation method by the number of input manpower and period by agreement between buyer and client. As there is no activity to calculate the number of input manpower based on the operational work history and based on the standard workload per activity. In this case is not guaranteed due to the simple agreement between the contractors. In this paper, we propose an application operating cost estimation model that measures the size of the operating software using function point analysis that is the basis of application operation tasks. In order to verify the validity of the application operation cost model, we verified the correlation between the application size and the labor cost through regression analysis using SPSS.

스마트 디바이스 기반 수업분석 프로그램 설계 및 구현 -한국어 특성 반영과 교사활용도 증진을 위한 UI설계를 적용하여- (Design and Implementation of Smart Device Application for Instructional Analysis)

  • 강두봉;정주훈;김영환
    • 컴퓨터교육학회논문지
    • /
    • 제18권4호
    • /
    • pp.31-40
    • /
    • 2015
  • 본 연구의 목적은 수업 개선을 위한 수업분석 프로그램을 스마트 디바이스 기반의 어플리케이션으로 설계 및 구현한 데 있다. 이를 위해 사용자 인터페이스(UI)를 간소화하고, 서술어가 뒤에 나오는 한국어 특성을 감안하였으며, 입체적 분석을 위해 Flanders의 '언어상호작용 분석법', Tuckman의 '수업분위기 분석법', Mcgraw의 '과업집중 분석법'의 3가지 방법을 통한 분석이 가능하게 설계하였다. 본 연구는 선행 연구들과 달리 위 3가지 특징을 적용하여 교사들이 손쉽게 스스로 자신의 수업을 분석할 수 있는 앱을 개발했다는데 의의가 있으며, 일선 교사들은 다른 교사의 도움이나 전문적 지식 없이도 수업을 분석하고 피드백 할 수 있어 자발적 수업개선에 도움이 될 수 있을 것이다. 향후, 최근의 수업 환경에 맞는 수업분석 기법 및 음성인식 시스템 등의 연구와 연계하여 수업분석 원리의 정립과 관련 어플리케이션의 개발에 기초가 될 수 있을 것이다.

중소기업체의 ISO 9000품질시스템 운영실태 (ISO 900G Quality System Application Status of Small & Medium Size Industrial Companies)

  • 김복만;박종화
    • 산업경영시스템학회지
    • /
    • 제24권66호
    • /
    • pp.59-67
    • /
    • 2001
  • This thesis is to research for analysis of ISO 9000 Quality Management System application status of small & medium-sized Industrial Companies. For this research, 10 companies certified by ISO 9000 standard were selected. By using an evaluation method and a software for analysis of application, this thesis compared, analyzed and evaluated the application status before and after certificate of ISO 9000, and identified the performance and difficulty of QMS application, and then proposed improvement methodology for ISO 9000 effective application.

  • PDF

Differential die-away technology applied to detect special nuclear materials

  • Lianjun Zhang;Mengjiao Tang;Chen Zhang;Yulai Zheng;Yong Li;Chao Liu;Qiang Wang;Guobao Wang
    • Nuclear Engineering and Technology
    • /
    • 제55권7호
    • /
    • pp.2483-2488
    • /
    • 2023
  • Differential die-away analysis (DDAA) technology is a special nuclear material (SNM) active detection analysis technology. Be a nuclear material shielded or not, the technology can reveal the existence of nuclear materials by inducing fission from an external pulsed neutron source. In this paper, a detection model based on DDAA analysis technology was established by geant4 Monte Carlo simulation software, and the optimal sensitivity of the detection system is achieved by optimizing different configurations. After the geant4 simulation and optimization, a prototype was established, and experimental research was carried out. The result shows that the prototype can detect 200 g of 235U in a steel cylinder shield that's of 1.5 cm in inner diameter, 10 cm in thickness and 280 kg in weight.

A Modeling Tool for X-Window Application Software Development

  • Lee, Joon-Seok;Lee, Sang-Bum;Chi, Dong-Hae
    • ETRI Journal
    • /
    • 제15권2호
    • /
    • pp.75-84
    • /
    • 1993
  • This paper presents a modeling tool, so-called X-ADD (X-window application Analysis & Design Diagram), which is useful for the understanding of existing X-window application program and the development of new X-window application software. This X-ADD tool is available for the X-window applications maintenance activities such as program understanding, and program analysis by the concept of reverse engineering. In addition, it supports the analysis and design for the new X-window application system development. Therefore, by the use of this tool, the visibility of the existing X-window application programs can be enhanced and modeling for the design of new X-window application systems can be easily made.

  • PDF

Investigation and Analysis of Mathematics Application Ability of Student of Senior One

  • Dan Qi
    • 한국수학교육학회지시리즈D:수학교육연구
    • /
    • 제9권3호
    • /
    • pp.295-303
    • /
    • 2005
  • Students' mathematics application ability is a hot spot which mathematics education pays attention. So, I have carried on the test of mathematics application and the questionnaire survey to student of Senior One of the two middle schools. Through the test and the investigation, I discover that the level of the students' mathematics application ability is not high. To the simple application question, the difference of the male and the female is not big, but to the difficult application question, the male and the female has the remarkable difference. The students' lack of flexible and the original cognition monitoring ability in mathematics application process are afraid of studying mathematics application since childhood and lack of the training of this aspect. They thought mathematics foundation and reading understood ability is the key of mathematics application. Through analysis result of investigation, this paper proposed the way to raise mathematics application ability of students.

  • PDF